Cybersecurity 101

In today’s digital world, cybersecurity is essential. At WatchGuard, we break down key cybersecurity topics with clear explanations, practical examples, and proven best practices. Whether you want to learn about network security, endpoint protection, identity management, or cyber threats—start your journey with Cybersecurity 101.

C

CASB

Stands for Cloud Access Security Broker. A security solution that emphasizes strict access control and continuous verification by enforcing access policies for cloud resources and applications. An important component of a zero trust architecture.

Clickjacking

A type of attack in which the victim clicks on links on a website they believe to be a known, trusted website. However, they are actually clicking on a malicious, hidden website overlaid onto the known website.

Credential Stuffing

An attack that uses stolen username and password combinations from previous data breaches to attempt logins into other services. Since many people reuse passwords, attackers run automated tools that test millions of credential pairs against target websites.

Cross-Site Scripting

An attack performed through web browsers, taking advantage of poorly-written web apps. For example, an attacker can trick a user into clicking on a specially crafted, malicious hyperlink that appears to lead to an innocent site, but the site is actually the attacker's and includes embedded scripts.

CVE

Stands for Common Vulnerabilities and Exposures. A list of standardized names for all publicly known vulnerabilities and exposures, essential for vulnerability management, as it allows companies to prioritize threats and ensure they are not using outdated, insecure software.

Cyber Attack

A cyberattack is a deliberate attempt by an individual or group to compromise another party’s information system. Attackers typically aim to disrupt operations or gain unauthorized access to data for personal or organizational gain.

Read More

Cyber Insurance

A type of insurance that limits a policy holder’s liability and manages recovery costs in the event of a cyberattack, data breach, or act of cyberterrorism. Insurance providers increasingly demand core zero trust principles, including multi-factor authentication (MFA) and Endpoint Detection and Response (EDR). A zero trust strategy makes it much easier to obtain policies and lowers premiums.